1: \begin{thebibliography}{1}
2: \providecommand{\url}[1]{#1}
3: \csname url@rmstyle\endcsname
4: \providecommand{\newblock}{\relax}
5: \providecommand{\bibinfo}[2]{#2}
6: \providecommand\BIBentrySTDinterwordspacing{\spaceskip=0pt\relax}
7: \providecommand\BIBentryALTinterwordstretchfactor{4}
8: \providecommand\BIBentryALTinterwordspacing{\spaceskip=\fontdimen2\font plus
9: \BIBentryALTinterwordstretchfactor\fontdimen3\font minus
10: \fontdimen4\font\relax}
11: \providecommand\BIBforeignlanguage[2]{{%
12: \expandafter\ifx\csname l@#1\endcsname\relax
13: \typeout{** WARNING: IEEEtran.bst: No hyphenation pattern has been}%
14: \typeout{** loaded for the language `#1'. Using the pattern for}%
15: \typeout{** the default language instead.}%
16: \else
17: \language=\csname l@#1\endcsname
18: \fi
19: #2}}
20:
21: \bibitem{deng-intrusion}
22: J.~Deng, R.~Han, and S.~Mishra, ``Intrusion tolerance and anti-traffic analysis
23: strategies for wireless sensor networks,'' in \emph{DSN '04: Proceedings of
24: the 2004 International Conference on Dependable Systems and Networks
25: (DSN'04)}.\hskip 1em plus 0.5em minus 0.4em\relax Washington, DC, USA: IEEE
26: Computer Society, 2004, p. 637.
27:
28: \bibitem{mathewson-practical}
29: \BIBentryALTinterwordspacing
30: N.~Mathewson and R.~Dingledine, ``Practical traffic analysis: Extending and
31: resisting statistical disclosure.'' [Online]. Available:
32: \url{citeseer.ist.psu.edu/678780.html}
33: \BIBentrySTDinterwordspacing
34:
35: \bibitem{newman-metrics}
36: \BIBentryALTinterwordspacing
37: R.~E. Newman, I.~S. Moskowitz, P.~Syverson, and A.~Serjantov, ``Metrics for
38: traffic analysis prevention.'' [Online]. Available:
39: \url{citeseer.ist.psu.edu/653919.html}
40: \BIBentrySTDinterwordspacing
41:
42: \bibitem{syverson97anonymous}
43: \BIBentryALTinterwordspacing
44: P.~F. Syverson, D.~M. Goldschlag, and M.~G. Reed, ``Anonymous connections and
45: onion routing,'' in \emph{{IEEE} Symposium on Security and Privacy}, Oakland,
46: California, 4--7 1997, pp. 44--54. [Online]. Available:
47: \url{citeseer.ist.psu.edu/syverson97anonymous.html}
48: \BIBentrySTDinterwordspacing
49:
50: \bibitem{deng-antitrafficanalysis}
51: J.~Deng, R.~Han, and S.~Mishra, ``Countermeasures againts traffic analysis
52: attacks in wireless sensor networks,'' in \emph{SecureComm '05: CerateNet
53: Conference on Security and Privacy in Communication Networks (SecureComm
54: 2005)}.\hskip 1em plus 0.5em minus 0.4em\relax IEEE Computer Society, 2005,
55: pp. 113--124.
56:
57: \bibitem{lee-01}
58: S.~Lee and M.~Gerla, ``Split multipath routing with maximally disjoint paths in
59: ad hoc networks,'' in \emph{Proceedings of the IEEE International Conference
60: on Communication (ICC)}, 2001, pp. 3201--3205.
61:
62: \bibitem{xu-01}
63: Y.~Xu, J.~Heidemann, and D.~Estrin, ``Geography-informed energy conservation
64: for ad hoc routing,'' in \emph{MobiCom '01: Proceedings of the 7th annual
65: international conference on Mobile computing and networking}.\hskip 1em plus
66: 0.5em minus 0.4em\relax New York, NY, USA: ACM Press, 2001, pp. 70--84.
67:
68: \bibitem{ns2}
69: \BIBentryALTinterwordspacing
70: ``Network simulator - ns2.'' [Online]. Available:
71: \url{http://www.isi.edu/nsnam/ns/}
72: \BIBentrySTDinterwordspacing
73:
74: \end{thebibliography}
75: